SlideShare a Scribd company logo
1 of 27
IT 4102




          C.I.E.Jayasooriya
          ATI - Kurunegala
   Functions of a version control system
   Components of a version control system
   Change Control
   Testing
   Developing the configuration management
    plan
   Subversion
   Pragmatic Version Control using Subversion
    by Mike Mason
   Configuration Management Principles &
    Practices by Anne Mette Jonassen
    Configuration Management is unique
    identification , controlled storage , change
    control & status reporting of selected
    intermediate work products product
    components & products during the life of a
    system
   Configuration management activities may be
    viewed as cyclic for each item class placed
    under configuration management
   Identification
   Storage
   Change control
   Status reporting
   The purpose of the identification activity is to
    determine the metadata for a configuration
    item
   Meta data –
     It describes configuration items
     Metadata for a configuration item may include its
     name, the name of the person who produced the
     item, the production date, and references to other
     related configuration items.
   Two incidents may initiate the identification
    process:
     In the beginning identification starts with a need
      defined in the plans (eg: project plan)
     When you have to change a configuration
      item, identification start with a change request
   Meta Data
   Methods, conventions, and procedures
    necessary for the activities in identification
     Procedures for registration of metadata
     Procedures for inheritance of metadata
     Conventions for unique identification
     Conventions for authorization
     Conventions for identification of components in a
     delivery
   Project and year: SC.91
   Document number: 009
   Author : OA.ect
   Activity identifier: T2.3.1
   Document type: RP (Report)
   Version: 02
   The purpose of storage is to ensure that a
    configuration item
     will not disappear or be damaged
     it can be found at any time
     delivered in the condition in which you expect to
      find it
     that a record is kept to indicate who has been
      given the item or a copy of it.
   Storage takes place in libraries.
   There are 3 types
     Controlled library/configuration management
      library
      ▪ It is where configuration items are stored.
      ▪ It may be divided into a number of physical libraries such
        as documents, source code,etc
     Dynamic library/development library
      ▪ It is where items are kept while they are being produced
      ▪ this will be in the producer's own area
 Static Library/user library
  ▪ It is where items are used
  ▪ While being used in the static library, items must not be
    changed.
   Placement in storage from production
   Release from storage for usage
   Release from storage for production
The methods, conventions, and procedures
  necessary for activities in storage may be
 Procedures for placing items in storage and
  related updating of metadata
 Procedures for release for usage
 Procedures for release for production
 Templates for item approval
 Templates for release request
   change control is a set of processes and
    approval stages required to change a
    configuration item's attributes
   The configuration control board (CCB) is
    responsible for change control.
   Event registration
   documented events
   change requests
   Creation of the event registration
   Analysis of the event registration
   Rejection or acceptance of the event
    registration.
   The change request initiates a new
    configuration item.
   A new configuration item is identified and
    created, and the change is implemented
   Closing of the change request.
   Closing of the event registration.
User        Creation of event registration




Developer   Analysis of event registration   Implementation of change




CCB              Evaluation of event                                         Approval or
                    registration                                        disapproval of change




QA                                              Validation of change
   Status reporting makes available, in a useful
    and readable way, the information necessary
    to effectively manage a product's
    development and maintenance
   Output – status reports
              Release notes
              Item lists
              Trace matrix
    Procedures for the production of available
    status reports
   Procedures for ad hoc extraction of
    information
   Templates for status reports

More Related Content

What's hot

Configuration Management
Configuration ManagementConfiguration Management
Configuration ManagementSaqib Raza
 
A Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration ManagementA Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration ManagementMd Mamunur Rashid
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration ManagementJeyanthiR
 
System quality attributes
System quality attributes System quality attributes
System quality attributes Adil Mehmoood
 
Konfigurasyon yonetim stratejisi
Konfigurasyon yonetim stratejisiKonfigurasyon yonetim stratejisi
Konfigurasyon yonetim stratejisiVolkan OZCAN
 
2.software requirement specification
2.software requirement specification2.software requirement specification
2.software requirement specificationDeepak Sharma
 
Implementation issues software engineering
Implementation issues software engineeringImplementation issues software engineering
Implementation issues software engineeringrishi ram khanal
 
Configuration Management
Configuration Management Configuration Management
Configuration Management hdicapitalarea
 
Agile Development | Agile Process Models
Agile Development | Agile Process ModelsAgile Development | Agile Process Models
Agile Development | Agile Process ModelsAhsan Rahim
 
Software evolution and Verification,validation
Software evolution and Verification,validationSoftware evolution and Verification,validation
Software evolution and Verification,validationArchanaMani2
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration managementfizamustanser
 
Game development (Game Architecture)
Game development (Game Architecture)Game development (Game Architecture)
Game development (Game Architecture)Rajkumar Pawar
 

What's hot (20)

Configuration Management
Configuration ManagementConfiguration Management
Configuration Management
 
Ch6 architectural design
Ch6 architectural designCh6 architectural design
Ch6 architectural design
 
Ch8.testing
Ch8.testingCh8.testing
Ch8.testing
 
A Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration ManagementA Brief Introduction to Software Configuration Management
A Brief Introduction to Software Configuration Management
 
Ch25 configuration management
Ch25 configuration managementCh25 configuration management
Ch25 configuration management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Ch16 component based software engineering
Ch16 component based software engineeringCh16 component based software engineering
Ch16 component based software engineering
 
System quality attributes
System quality attributes System quality attributes
System quality attributes
 
Konfigurasyon yonetim stratejisi
Konfigurasyon yonetim stratejisiKonfigurasyon yonetim stratejisi
Konfigurasyon yonetim stratejisi
 
2.software requirement specification
2.software requirement specification2.software requirement specification
2.software requirement specification
 
Implementation issues software engineering
Implementation issues software engineeringImplementation issues software engineering
Implementation issues software engineering
 
System implemantation
System implemantationSystem implemantation
System implemantation
 
Configuration Management
Configuration Management Configuration Management
Configuration Management
 
Agile Development | Agile Process Models
Agile Development | Agile Process ModelsAgile Development | Agile Process Models
Agile Development | Agile Process Models
 
Test plan
Test planTest plan
Test plan
 
Software evolution and Verification,validation
Software evolution and Verification,validationSoftware evolution and Verification,validation
Software evolution and Verification,validation
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 
Ch24 quality management
Ch24 quality managementCh24 quality management
Ch24 quality management
 
Sqa plan
Sqa planSqa plan
Sqa plan
 
Game development (Game Architecture)
Game development (Game Architecture)Game development (Game Architecture)
Game development (Game Architecture)
 

Viewers also liked

Configuration management
Configuration managementConfiguration management
Configuration managementKobi Vider
 
Software Estimation Technique
Software Estimation TechniqueSoftware Estimation Technique
Software Estimation TechniqueGeorge Ukkuru
 
software configuratiom management role n resposnbilities
software configuratiom management role n resposnbilitiessoftware configuratiom management role n resposnbilities
software configuratiom management role n resposnbilitiesMahesh Panchal
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Managementguy_davis
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Managementelliando dias
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration managementShivani Garg
 
Software estimation techniques
Software estimation techniquesSoftware estimation techniques
Software estimation techniquesTan Tran
 
Estimation techniques and software metrics
Estimation techniques and software metricsEstimation techniques and software metrics
Estimation techniques and software metricsMae Abigail Banquil
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniqueskamal
 

Viewers also liked (9)

Configuration management
Configuration managementConfiguration management
Configuration management
 
Software Estimation Technique
Software Estimation TechniqueSoftware Estimation Technique
Software Estimation Technique
 
software configuratiom management role n resposnbilities
software configuratiom management role n resposnbilitiessoftware configuratiom management role n resposnbilities
software configuratiom management role n resposnbilities
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 
Software estimation techniques
Software estimation techniquesSoftware estimation techniques
Software estimation techniques
 
Estimation techniques and software metrics
Estimation techniques and software metricsEstimation techniques and software metrics
Estimation techniques and software metrics
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
 

Similar to Software configuration management

Configuration Management Report
Configuration Management ReportConfiguration Management Report
Configuration Management ReportShravan Bhagirath
 
Software Configuration Management introduction
Software Configuration Management introductionSoftware Configuration Management introduction
Software Configuration Management introductionMani Deepak Choudhry
 
Software configuration management, Web engineering
Software configuration management, Web engineeringSoftware configuration management, Web engineering
Software configuration management, Web engineeringdivyammo
 
Mod5-SCM.ppt
Mod5-SCM.pptMod5-SCM.ppt
Mod5-SCM.pptdivyammo
 
Mod5-SCM.ppt
Mod5-SCM.pptMod5-SCM.ppt
Mod5-SCM.pptdivyammo
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration ManagementPratik Tandel
 
Unit 6 Software Configuration Management
Unit 6 Software Configuration ManagementUnit 6 Software Configuration Management
Unit 6 Software Configuration ManagementKanchanPatil34
 
SharePoint Configuration Management – Effective Techniques for Regulated Shar...
SharePoint Configuration Management – Effective Techniques for Regulated Shar...SharePoint Configuration Management – Effective Techniques for Regulated Shar...
SharePoint Configuration Management – Effective Techniques for Regulated Shar...Montrium
 
Software maintenance and configuration management, software engineering
Software maintenance and  configuration management, software engineeringSoftware maintenance and  configuration management, software engineering
Software maintenance and configuration management, software engineeringRupesh Vaishnav
 
Project management information system
Project management information systemProject management information system
Project management information systemPradeep Patel, PMP®
 
Breaking the Barriers to Agile Adoption in Safety- and Quality-Critical Envir...
Breaking the Barriers to Agile Adoption in Safety- and Quality-Critical Envir...Breaking the Barriers to Agile Adoption in Safety- and Quality-Critical Envir...
Breaking the Barriers to Agile Adoption in Safety- and Quality-Critical Envir...Seapine Software
 
software configuration management ppt
 software configuration management  ppt software configuration management  ppt
software configuration management pptYeshiwas Getachew
 
R12 Business Case Process Manufacturing
R12 Business Case Process ManufacturingR12 Business Case Process Manufacturing
R12 Business Case Process ManufacturingVaddadi Anil Srinivas
 
Software Project Management: Configuration Management
Software Project Management: Configuration ManagementSoftware Project Management: Configuration Management
Software Project Management: Configuration ManagementMinhas Kamal
 

Similar to Software configuration management (20)

Ch 10(spi)cm mi-cm-ppqa
Ch 10(spi)cm mi-cm-ppqaCh 10(spi)cm mi-cm-ppqa
Ch 10(spi)cm mi-cm-ppqa
 
Ch 10(spi)cm mi-cm-ppqa
Ch 10(spi)cm mi-cm-ppqaCh 10(spi)cm mi-cm-ppqa
Ch 10(spi)cm mi-cm-ppqa
 
Configuration Management Report
Configuration Management ReportConfiguration Management Report
Configuration Management Report
 
Software Configuration Management introduction
Software Configuration Management introductionSoftware Configuration Management introduction
Software Configuration Management introduction
 
lecture14.ppt
lecture14.pptlecture14.ppt
lecture14.ppt
 
Software configuration management, Web engineering
Software configuration management, Web engineeringSoftware configuration management, Web engineering
Software configuration management, Web engineering
 
Mod5-SCM.ppt
Mod5-SCM.pptMod5-SCM.ppt
Mod5-SCM.ppt
 
Mod5-SCM.ppt
Mod5-SCM.pptMod5-SCM.ppt
Mod5-SCM.ppt
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
What is configuration management
What is configuration managementWhat is configuration management
What is configuration management
 
Unit 6 Software Configuration Management
Unit 6 Software Configuration ManagementUnit 6 Software Configuration Management
Unit 6 Software Configuration Management
 
SE-Lecture-8.pptx
SE-Lecture-8.pptxSE-Lecture-8.pptx
SE-Lecture-8.pptx
 
SharePoint Configuration Management – Effective Techniques for Regulated Shar...
SharePoint Configuration Management – Effective Techniques for Regulated Shar...SharePoint Configuration Management – Effective Techniques for Regulated Shar...
SharePoint Configuration Management – Effective Techniques for Regulated Shar...
 
Software maintenance and configuration management, software engineering
Software maintenance and  configuration management, software engineeringSoftware maintenance and  configuration management, software engineering
Software maintenance and configuration management, software engineering
 
Project management information system
Project management information systemProject management information system
Project management information system
 
Breaking the Barriers to Agile Adoption in Safety- and Quality-Critical Envir...
Breaking the Barriers to Agile Adoption in Safety- and Quality-Critical Envir...Breaking the Barriers to Agile Adoption in Safety- and Quality-Critical Envir...
Breaking the Barriers to Agile Adoption in Safety- and Quality-Critical Envir...
 
software configuration management ppt
 software configuration management  ppt software configuration management  ppt
software configuration management ppt
 
Checklist
ChecklistChecklist
Checklist
 
R12 Business Case Process Manufacturing
R12 Business Case Process ManufacturingR12 Business Case Process Manufacturing
R12 Business Case Process Manufacturing
 
Software Project Management: Configuration Management
Software Project Management: Configuration ManagementSoftware Project Management: Configuration Management
Software Project Management: Configuration Management
 

More from Thilini munasinghe

More from Thilini munasinghe (6)

RDBMS_IT_Lecture_View_Via_SQL
RDBMS_IT_Lecture_View_Via_SQLRDBMS_IT_Lecture_View_Via_SQL
RDBMS_IT_Lecture_View_Via_SQL
 
HNDIT_SRI_LANKA
HNDIT_SRI_LANKAHNDIT_SRI_LANKA
HNDIT_SRI_LANKA
 
Ict act in sri lanka
Ict act in sri lankaIct act in sri lanka
Ict act in sri lanka
 
Foss introduction and history
Foss introduction and historyFoss introduction and history
Foss introduction and history
 
Foss business model
Foss business modelFoss business model
Foss business model
 
C# Fundamental
C# FundamentalC# Fundamental
C# Fundamental
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Software configuration management

  • 1. IT 4102 C.I.E.Jayasooriya ATI - Kurunegala
  • 2. Functions of a version control system  Components of a version control system  Change Control  Testing  Developing the configuration management plan  Subversion
  • 3. Pragmatic Version Control using Subversion by Mike Mason  Configuration Management Principles & Practices by Anne Mette Jonassen
  • 4. Configuration Management is unique identification , controlled storage , change control & status reporting of selected intermediate work products product components & products during the life of a system
  • 5. Configuration management activities may be viewed as cyclic for each item class placed under configuration management
  • 6. Identification  Storage  Change control  Status reporting
  • 7.
  • 8. The purpose of the identification activity is to determine the metadata for a configuration item  Meta data –  It describes configuration items  Metadata for a configuration item may include its name, the name of the person who produced the item, the production date, and references to other related configuration items.
  • 9.
  • 10. Two incidents may initiate the identification process:  In the beginning identification starts with a need defined in the plans (eg: project plan)  When you have to change a configuration item, identification start with a change request
  • 11. Meta Data
  • 12. Methods, conventions, and procedures necessary for the activities in identification  Procedures for registration of metadata  Procedures for inheritance of metadata  Conventions for unique identification  Conventions for authorization  Conventions for identification of components in a delivery
  • 13. Project and year: SC.91  Document number: 009  Author : OA.ect  Activity identifier: T2.3.1  Document type: RP (Report)  Version: 02
  • 14. The purpose of storage is to ensure that a configuration item  will not disappear or be damaged  it can be found at any time  delivered in the condition in which you expect to find it  that a record is kept to indicate who has been given the item or a copy of it.
  • 15. Storage takes place in libraries.  There are 3 types  Controlled library/configuration management library ▪ It is where configuration items are stored. ▪ It may be divided into a number of physical libraries such as documents, source code,etc  Dynamic library/development library ▪ It is where items are kept while they are being produced ▪ this will be in the producer's own area
  • 16.  Static Library/user library ▪ It is where items are used ▪ While being used in the static library, items must not be changed.
  • 17. Placement in storage from production  Release from storage for usage  Release from storage for production
  • 18. The methods, conventions, and procedures necessary for activities in storage may be  Procedures for placing items in storage and related updating of metadata  Procedures for release for usage  Procedures for release for production  Templates for item approval  Templates for release request
  • 19. change control is a set of processes and approval stages required to change a configuration item's attributes  The configuration control board (CCB) is responsible for change control.
  • 20.
  • 21. Event registration
  • 22. documented events  change requests
  • 23. Creation of the event registration  Analysis of the event registration  Rejection or acceptance of the event registration.  The change request initiates a new configuration item.  A new configuration item is identified and created, and the change is implemented  Closing of the change request.  Closing of the event registration.
  • 24. User Creation of event registration Developer Analysis of event registration Implementation of change CCB Evaluation of event Approval or registration disapproval of change QA Validation of change
  • 25. Status reporting makes available, in a useful and readable way, the information necessary to effectively manage a product's development and maintenance
  • 26. Output – status reports  Release notes  Item lists  Trace matrix
  • 27. Procedures for the production of available status reports  Procedures for ad hoc extraction of information  Templates for status reports